Security Protocol Function Using Quantum Elliptic Curve Cryptography Algorithm

被引:6
|
作者
Sudharson, K. [1 ]
Arun, S. [2 ]
机构
[1] Anna Univ, Dept Informat & Commun Engn, Chennai 600025, Tamil Nadu, India
[2] Prathyusha Engn Coll, Dept ECE, Thiruvallur 602025, India
来源
关键词
Quantum computing; elliptic curves; mobile ad hoc networks; cryptography; wireless sensor networks; KEY DISTRIBUTION; AUTHENTICATION PROTOCOL;
D O I
10.32604/iasc.2022.026483
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Quantum Computing (QC). The content of node or sink nodes is pro-cessed using the fundamental principles of quantum mechanics. However, crypto-graphy techniques face several other issues, such as availability, integrity, andvulnerability, to name a few. The researchers have overcome many obstacles,yet security remains a crucial concern in QC. However, experimenters recentlydiscovered that the QC has a lot more data hacking than static networks. More-over, the bitwise error is still present in implementing the Quantum ComputingCryptography Protocol (QCCP). Because all nodes are mobile and dynamic topol-ogy occurs, the proposed research uses the Quantum Elliptical Curve Cryptogra-phy (QECC) protocol. To provide the appropriate key generation and key sharingmechanism to convert the fool node to a brawny node and avoid packet loss andenergy consumption in the network. By turning the fool node into a vital node, theQECC lowers the network's error rate. The experiment uses Network Simulator2 to achieve successful outcomes such as decreased packet loss, reduced error ratewith increased energy consumption, increased pair key generation for additionalnodes, and increased packet size.
引用
收藏
页码:1769 / 1784
页数:16
相关论文
共 50 条
  • [41] Improvement and Implementation of One Elliptic Curve Cryptography Algorithm
    Kong, Qingyan
    [J]. INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT (EBM2011), VOLS 1-6, 2011, : 2438 - 2440
  • [42] Algorithm and implementation of elliptic curve public key cryptography
    Gong, Shu
    Liu, Wenjiang
    Rong, Mengtian
    [J]. Gaojishu Tongxin/High Technology Letters, 2004, 14 (03):
  • [43] A systematic review on elliptic curve cryptography algorithm for internet of things: Categorization, application areas, and security
    Adeniyi, Abidemi Emmanuel
    Jimoh, Rasheed Gbenga
    Awotunde, Joseph Bamidele
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2024, 118
  • [44] Elliptic Curve Cryptography with Security System in Wireless Sensor Networks
    Huang, Xu
    Sharma, Dharmendra
    [J]. IAENG TRANSACTIONS ON ENGINEERING TECHNOLOGIES, VOL 5, 2010, 1285 : 519 - 531
  • [45] Security in Data Forwarding Through Elliptic Curve Cryptography in Cloud
    Divya, S. V.
    Shaji, R. S.
    [J]. 2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2014, : 1083 - 1088
  • [46] Enhancement of IoT device security using an Improved Elliptic Curve Cryptography algorithm and malware detection utilizing deep LSTM
    Devi, R. Aiyshwariya
    Arunachalam, A. R.
    [J]. HIGH-CONFIDENCE COMPUTING, 2023, 3 (02):
  • [47] Low complexity smart grid security protocol based on elliptic curve cryptography, biometrics and hamming distance
    Mutlaq, Keyan Abdul-Aziz
    Nyangaresi, Vincent Omollo
    Omar, Mohd Adib
    Abduljabbar, Zaid Ameen
    Abduljaleel, Iman Qays
    Ma, Junchao
    Al Sibahee, Mustafa A.
    [J]. PLOS ONE, 2024, 19 (01):
  • [48] A Roaming Authentication Protocol based on Elliptic Curve Cryptography in IOV
    Shen Cen
    Mu Haibing
    [J]. PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 400 - 404
  • [49] A Lightweight RFID Authentication Protocol based on Elliptic Curve Cryptography
    Liu, Ya-Li
    Qin, Xiao-Lin
    Wang, Chao
    Li, Bo-Han
    [J]. JOURNAL OF COMPUTERS, 2013, 8 (11) : 2880 - 2887
  • [50] Elliptic Curve Cryptography on E-passport Authentication Protocol
    Saoudi, Safa
    Yousfi, Souheib
    Robbana, Riadh
    [J]. 2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, : 1253 - 1260